Endpoint Security , Next-Generation Technologies & Secure Development , Open XDR

Venture Captalist Kellermann Gets 'Back on the Field'

Joins Carbon Black as New Chief Cybersecurity Officer
Venture Captalist Kellermann Gets 'Back on the Field'
Tom Kellermann, chief cybersecurity officer, Carbon Black

After two years on the sidelines, watching what he calls the expansion of "cyber insurgency," Tom Kellermann declares himself "back on the field" as chief cybersecurity officer at Carbon Black, an endpoint security firm. How have threats evolved, and what is his hands-on mission?

Kellermann, until recently the CEO of Strategic Cyber Ventures, an investment fund, writes in a recent blog post that he just could not sit back and watch the threat landscape grow ever more nuanced and sinister.

"It became quite apparent that cyberspace is suffering a cyber insurgency," Kellermann says. "The overt colonization of American cyberspace has continued at breathtaking speed, and thus I have decided to get back on the field."

In an interview about his new role at Carbon Black, Kellermann:

  • Defines the current threat landscape;
  • Discusses the evolution of security technology;
  • Outlines his game plan with Carbon Black.

Kellermann, the former CEO at Strategic Cyber Ventures, is a cyber-intelligence expert, author, professor and leader in the field of cybersecurity. He held a seat on the Commission on Cyber Security for the 44th President of the United States and served as an adviser to the International Cyber Security Protection Alliance. As chief cybersecurity officer for Trend Micro Inc., he was responsible for analysis of emerging cybersecurity threats and relevant defensive technologies. In addition to his professional work, Kellermann was a professor at American University's School of International Service and the Kogod School of Business, and he co-authored the book, "E-safety and Soundness: Securing Finance in a New Age." He is a Certified Information Security Manager and a Certified Ethical Hacker.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.